nccgroup / SolitudeLinks
Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more advanced researcher, Solitude makes the process of evaluating user privacy within an app accessible for everyone.
☆372Updated 4 years ago
Alternatives and similar repositories for Solitude
Users that are interested in Solitude are comparing it to the libraries listed below
Sorting:
- Learning Shodan through katas☆466Updated 5 years ago
- Harden your Chrome browser via enterprise policy.☆294Updated 2 years ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆721Updated last week
- Penetrum LLC opensource security tool list.☆656Updated 3 years ago
- Private key usage verification☆429Updated 4 months ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆268Updated this week
- OS image for the PiRogue based on Debian 12☆158Updated last year
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆300Updated 7 months ago
- Russian Keyboard Registry Script☆115Updated 4 years ago
- Ongoing Infosec Deals☆111Updated 8 months ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- An Open Letter to the OWASP Board☆107Updated 2 years ago
- High speed/Low cost CommonCrawl RegExp in Node.js☆255Updated last year
- A research-based pihole list to reduce tracking by Apple and Google☆322Updated 2 years ago
- DNS covert channel implant for Red Teams.☆732Updated 5 years ago
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆121Updated last year
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆356Updated 3 weeks ago
- Tools, data, and contact lists relevant to The disclose.io Project.☆327Updated last year
- Repository demonstrating the Capital One breach on your AWS account☆242Updated 4 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆109Updated 5 years ago
- A collection of awesome projects, blog posts, books, and talks on quantifying risk☆457Updated 5 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- A tool to hunt for credentials in github wild AKA git*hunt☆297Updated 2 years ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆72Updated 2 years ago
- A Passive SSH back-end and scanner.☆103Updated 2 months ago
- AI-based, context-driven network device ranking☆299Updated last year
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆272Updated 4 years ago
- External monitoring for organization assets☆411Updated last year
- Extract and Visualize Data from URLs using Unfurl☆687Updated 2 weeks ago
- Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudo☆39Updated 4 years ago